- HX Weekly
- Posts
- From Apple to TikTok, From Prudential to Bank of America
From Apple to TikTok, From Prudential to Bank of America
And not forgetting the worldwide election this year, this week we see for-profit businesses try to protect people using technology as well as malicious activities targeting elections skyrocketing!
☝️ TOP STORY
The long-held misconception that Apple computers are impregnable to viruses, malware and ransomware has yet again been proven false! And if you have a Mac and one of your apps is Visual Studio code editor, look closely before you update it. Related link: macOS Targeted by New Backdoor Linked to ALPHV Ransomware. |
PC users must continue to stay vigilant as cyber attacks generally increase across the board. Remember, use 2FA/MFA where.
And, yes, let’s talk about the new text-to-video AI next week. (Yup! That can wait.)
📰 Headline Highlights 📰
✍️ Noteworthy
Communities of color and other marginalized groups are disproportionately impacted and lacked the support to protect themselves because they have to focus more on basic needs than on cybersecurity. If you know anybody who can benefit from the services of Hexagon Center, don’t forget to tell them about us. |
BONUS CONTENTS + HOUSEKEEPING
Cybersecurity 🛡️ Awareness 👨💻
Can you tell the difference between AI and real person?
New York Times has a great picture quiz for you to test yourself to see how well you can tell if the picture is created by AI or it’s a real person. Subscription required. (If you know someone with a subscription, you can ask them to give you a gift link. Otherwise, below are links to other tests that are free.) |
NBC News: Which image is created by AI?
Bloomberg: Can you do better than Google?
📌 Reminder of the Week
Always use 2-way verification
Although 2FA or MFA is good, you will find yourself in situations where you may need a 2-Way Verification.
Whenever you find yourself in questionable situations like sending money to someone you love, verify WHOM it is you think you are sending the money to. Ask if you can call that person back. If not, make sure you are able to verify the person in another manner, like asking intimate details about that person. For example, ask the person a set of personal questions like birthday, where he or she was born, how many cousins or aunts or uncles, etc. |
It doesn’t have to be a word or phrase, it can be a set of questions. So that when your loved one calls to ask you to send money to him or her, you can ensure that that’s who you’re really talking with.
📱TEC TIP ✍️
Establish at least 2 Personal Identifiers with people close to you. (And do not share them with anyone.)
AI muddies the water of reality
We all have benefited from AI at about the same rate as it has made our lives more dangerous. And deep down inside, we know that it is here to stay - whether we like it or not, whether we want it or not.
For this week’s Editor’s Note, we want take this opportunity to offer a tip to our readers: use low-tech to check the veracity of the content you are consuming. We could’ve waited to share this next week but that’s how critically important dealing with AI is today.
Hexagon Center is setting up shops in your neighborhood. As we expand our reach, we are spending a couple hours a week in your local libraries and community centers to help you combat cybercriminals and defend you from nefarious and malicious cyber attacks.
Glossary/Legend:
EN - Editor’s Note and Inside ⬡
HH - Headline Highlights section
TS - Top Story section, first story located above the fold.
2FA/MFA - 2-Factor Authentication/Multi-Factor Authentication is a method of access where instead of using a single form of authentication like password or passcode, etc, you are expected to use two or more forms of authentication to gain access.
Deepfake - A synthetic media that has been manipulated to replace one person's likeness with another. Deepfakes are created by a special type of machine learning called "deep" learning. They can be videos, photos, or audio recordings that appear real but have been manipulated with AI.
Personal Identifier - A phrase, code or situation that correctly identifies the person you are trying to verify.
Doxing - derived from the term “dropping dox,” or “documents.” Doxing is a form of cyberbullying that uses sensitive or secret information, statements, or records for the harassment, exposure, financial harm, or other exploitation of targeted individuals.
Spread cybersecurity culture
Do you have any suggestions on how we can further share this newsletter? Tell your friends and family about us by sharing with them the link:
hxweekly.beehiiv.com
You may reply to this newsletter or email us at
[email protected]
Send us any questions or things you want to talk about. Please share some fun facts with us. We welcome feedback and suggestions.
Hexagon Center is formed as a nonprofit corporation in California for public benefit,
in the process of attaining 501(c)(3) status.
DISCLAIMER
Cybersecurity is an ever-changing field, and threats may evolve. While Hexagon Center strives to provide accurate and timely information, we cannot guarantee absolute security. Users are responsible for implementing their security measures and staying informed about the latest cybersecurity developments.
Reply